Mostrando 642,021 - 642,040 Resultados de 650,569 Para Buscar 'C5N~', tiempo de consulta: 1.87s Limitar resultados
  1. 642021
  2. 642022
    por Bover, Ioseph M.
    Publicado 1950
    Materias: “…Biblia - - Texto sagrado: N. T. / griego-latín…”
    Libro
  3. 642023
    Publicado 2022
    Tabla de Contenidos: “…QWidget -- Creating the Menu Bar and Adding Actions -- Using Icons and the QIcon Class -- Explanation for Using Icons -- Setting the Central Widget -- Built-in Dialog Classes in PyQt -- The QFileDialog Class -- The QInputDialog Class -- The QFontDialog Class -- The QColorDialog Class -- The About QMessageBox -- Project 5.1 - Rich Text Notepad GUI -- Designing the Rich Text Notepad GUI -- Explanation for the Rich Text Notepad GUI -- Expanding the Features in a Main Window -- Explanation for Expanding the Features -- The QStatusBar Class -- Creating Submenus with Checkable Menu Items -- The QToolBar Class -- The QDockWidget Class -- Project 5.2 - Simple Photo Editor GUI -- Designing the Photo Editor GUI -- Explanation for the Photo Editor GUI -- Handling Images in the Photo Editor GUI -- The QPrinter Class -- Summary -- Chapter 6: Styling Your GUIs -- What Are Styles in PyQt? …”
    Libro electrónico
  4. 642024
    Publicado 2023
    Tabla de Contenidos: “…3.2.2 Collection -- 3.2.3 Analysis and Processing -- 3.2.4 Production -- 3.2.5 Dissemination -- 3.2.6 Review -- 3.3 Situational Awareness -- 3.3.1 Example - 2013 Target Breach -- 3.4 Goal Oriented Security and Threat Modelling -- 3.5 Strategic, Operational, and Tactical Intelligence -- 3.5.1 Strategic Intelligence -- 3.5.1.1 Example - Lazarus Group -- 3.5.2 Operational Intelligence -- 3.5.2.1 Example - SamSam -- 3.5.3 Tactical Intelligence -- 3.5.3.1 Example - WannaCry -- 3.5.4 Sources of Intelligence Reports -- 3.5.4.1 Example - Shamoon -- 3.6 Incident Preparedness and Response -- 3.6.1 Preparation and Practice -- Summary -- References -- Chapter 4 Collecting Intelligence -- 4.1 Hierarchy of Evidence -- 4.1.1 Example - Smoking Tobacco Risk -- 4.2 Understanding Intelligence -- 4.2.1 Expressing Credibility -- 4.2.2 Expressing Confidence -- 4.2.3 Understanding Errors -- 4.2.3.1 Example - the WannaCry Email -- 4.2.3.2 Example - the Olympic Destroyer False Flags -- 4.3 Third Party Intelligence Reports -- 4.3.1 Tactical and Operational Reports -- 4.3.1.1 Example - Heartbleed -- 4.3.2 Strategic Threat Reports -- 4.4 Internal Incident Reports -- 4.5 Root Cause Analysis -- 4.6 Active Intelligence Gathering -- 4.6.1 Example - the Nightingale Floor -- 4.6.2 Example - the Macron Leaks -- Summary -- References -- Chapter 5 Generating Intelligence -- 5.1 The Intelligence Cycle in Practice -- 5.1.1 See it, Sense it, Share it, Use it -- 5.1.2 F3EAD Cycle -- 5.1.3 D3A Process -- 5.1.4 Applying the Intelligence Cycle -- 5.1.4.1 Planning and Requirements -- 5.1.4.2 Collection, Analysis, and Processing -- 5.1.4.3 Production and Dissemination -- 5.1.4.4 Feedback and Improvement -- 5.1.4.5 The Intelligence Cycle in Reverse -- 5.2 Sources of Data -- 5.3 Searching Data -- 5.4 Threat Hunting -- 5.4.1 Models of Threat Hunting -- 5.4.2 Analysing Data…”
    Libro electrónico
  5. 642025
    Publicado 2022
    Tabla de Contenidos: “…(g) Interplay between Fundraising Regulation and Prosecution of Fraud -- 4.6 Due Process Rights -- 4.7 Equal Protection Rights -- 4.8 Delegation of Legislative Authority -- 4.9 Treatment of Religious Organizations -- (a) Basic Concepts -- (b) Constitutionality of Exemption -- 4.10 Other Constitutional Law Issues -- 4.11 Exemption for Membership Organizations -- 4.12 Defining Professional Fundraiser and Professional Solicitor -- 4.13 Direct‐Mail Fundraising Guidelines -- 4.14 Registration Fees -- 4.15 Fundraising by Means of the Internet -- (a) Internet Fundraising in General534 -- (b) Charleston Principles -- (c) Internet Fundraising-Some Specifics -- 4.16 Conclusions -- Chapter 5 Federal Regulation of Fundraising -- 5.1 Federal Regulation of Fundraising: How It Began -- (a) History -- (b) Special Emphasis Program -- (c) Checksheet -- (d) Audit Guidance -- (e) Perspective -- 5.2 Fundraising Disclosure by Charitable Organizations -- 5.3 Record‐Keeping Law -- 5.4 Charitable Gift Substantiation Law -- (a) 250 Threshold Law -- (b) Donee Substantiation Law -- (c) Nondonee Letter Substantiation -- (d) Other Substantiation Law -- 5.5 Quid Pro Quo Contribution Law -- 5.6 Fundraising Disclosure by Noncharitable Organizations -- 5.7 Excess Benefit Transactions Law -- (a) Basic Concepts of Intermediate Sanctions -- (b) Excess Benefit Transactions Law as Applied to Fundraising -- 5.8 Unrelated Business Law -- (a) Basic Concepts of Unrelated Income Taxation -- (b) Unrelated Income Law as Applied to Fundraising -- 5.9 Commensurate Test -- (a) Facts of the TAM -- (b) Law and Analysis in the TAM -- (c) Perspective -- 5.10 Appraisal Law -- (a) Overview -- (b) Definition of Qualified Appraisal -- (c) Definition of Qualified Appraiser -- (d) Substantial Compliance Doctrine -- 5.11 Reporting Law…”
    Libro electrónico
  6. 642026
    Publicado 2024
    Tabla de Contenidos: “…. -- Abbildung 3‐2: Graduelle Stufung von Fachsprachlichkeit (Kalverkämper, 1990: 123). -- Abbildung 3-3: Modell sprachlicher Kommunikation für den Fachtext (Hoffmann, 1988: 126). -- Abbildung 3-4: Hierarchisch-assoziatives Netzwerk von Begriffen mit zugeordneten Termini verschiedener Einzelsprachen (eigene Darstellung in Anlehnung an Hoffmann, 1993: 606). -- Abbildung 3‐5: Definition von Fachwissen (eigene Darstellung in Anlehnung an Kalverkämper, 1998a: 14-15). -- Abbildung 3-6: Grafische Darstellung der Betrachtungsfaktoren und der Beziehungen untereinander (Budin, 1996a: 187). -- Abbildung 3-7: Didaktisch-orientiertes Schreibprozessmodell (Göpferich, 2002: 250 -- graue Unterlegungen AH). -- Abbildung 3‐8: Konzept zum Einfluss von Emotionen auf Wissensentstehung und -veränderung (eigene Darstellung in Anlehnung an Baumann, 2004: 96-97). -- Abbildung 3‐9: Integratives Modell der Fachkommunikation (Schubert, 2007: 324). -- Abbildung 3-10: Extended Model of Knowledge Communication (Risku et al., 2011: 181). -- Abbildung 3‐11: Transformer-Gesamtprozess - Zusammenwirken der Encoder- und der Decoder-Seite des Transformers (Krüger, 2021: 319). -- Abbildung 3-12: Schema der kybernetischen Instanzen (von Cube, 1970 [1967]: 25 in Anlehnung an Frank, 1964: 5). -- Abbildung 3-13: Handlungsdimensionen (eigene Darstellung in Anlehnung an Schulz-Schaeffer, 2017: 12). -- Abbildung 3‐14: Research Model der Unified Theory of Acceptance and Use of Technology (Venkatesh et al., 2003: 447). -- Abbildung 4‐1: Modellebenen sowie Situation und Kontext. -- Abbildung 4-2: Modellelement ‚(Situierter) Wissensakteur WA (S)'. -- Abbildung 4-3: Modellelement ‚Kommunikat/Translat'…”
    Libro electrónico
  7. 642027
    Publicado 2022
    Tabla de Contenidos: “…3.4.1 Efficient points -- 3.5 Discussion and conclusion -- References -- Chapter 4 Improved crow search algorithm based on arithmetic crossover-a novel metaheuristic technique for solving engineering optimization problems -- 4.1 Introduction -- 4.2 Materials and methods -- 4.2.1 Crow search optimization -- 4.2.2 Arithmetic crossover based on genetic algorithm -- 4.2.3 Hybrid CO algorithm -- 4.3 Results and discussion -- 4.4 Conclusion -- Acknowledgments -- References -- Chapter 5 MOGROM: Multiobjective Golden Ratio Optimization Algorithm -- 5.1 Introduction -- 5.1.1 Definition of multiobjective problems (MOPs) -- 5.1.2 Literature review -- 5.1.3 Background and related work -- 5.2 GROM and MOGROM -- 5.2.1 MOGROM -- 5.3 Simulation results, investigation, and analysis -- 5.3.1 First class -- 5.3.2 Second class -- 5.3.3 Third class -- 5.3.4 Fourth class -- 5.3.5 Fifth class -- 5.4 Conclusion -- References -- Chapter 6 Multiobjective charged system search for optimum location of bank branch -- 6.1 Introduction -- 6.2 Multiobjective backgrounds -- 6.2.1 Dominance and Pareto Front -- 6.2.2 Performance metrics -- 6.2.2.2 Coverage of Two Sets (CS) -- 6.3 Utilized methods -- 6.3.1 NSGA-II algorithm -- 6.3.2 MOPSO algorithm -- 6.3.3 MOCSS algorithm -- 6.4 Analytic Hierarchy Process -- 6.5 Model formulation -- 6.6 Implementation and results -- 6.7 Conclusions -- References -- Chapter 7 Application of multiobjective Gray Wolf Optimization in gasification-based problems -- 7.1 Introduction -- 7.2 Systems description -- 7.2.1 Downdraft gasifier -- 7.2.2 Waste-to-energy plant -- 7.3 Modeling -- 7.4 Multicriteria Gray Wolf Optimization -- 7.5 Results and discussion -- 7.5.1 Optimization at the gasifier level -- 7.5.2 Optimization at the WtEP Level -- References…”
    Libro electrónico
  8. 642028
    por Sharma, A.K
    Publicado 2013
    Tabla de Contenidos: “…-- 2.3.2 Stepwise Refinement -- 2.3.3 Using Control Structures -- 2.4 Algorithm Analysis -- 2.4.1 Big-Oh Notation -- Chapter 3 : Arrays:Searching and Sorting -- 3.1 Introduction -- 3.2 One-dimensional Arrays -- 3.2.1 Traversal -- 3.2.2 Selection -- 3.2.3 Searching -- 3.2.4 Insertion and Deletion -- 3.2.5 Sorting -- 3.3 Multi-dimensional Arrays -- 3.4 Representation of Arrays in Physical Memory -- 3.4.1 Physical Address Computation of Elements of One-dimensional Arrays -- 3.4.2 Physical Address Computation of Elements of Two-dimensional Arrays -- 3.5 Applications of Arrays -- 3.5.1 Polynomial Representation and Operations -- 3.5.2 Sparse Matrix Representation -- Chapter 4 : Stacks and Queues -- 4.1 Stacks -- 4.1.1 Stack Operations -- 4.2 Applications of Stacks -- 4.2.1 Arithmetic Expressions -- 4.3 Queues -- 4.3.1 Queue Operations -- 4.3.2 Circular Queue -- 4.3.3 Priority Queue -- 4.3.4 The Deque -- Chapter 5 : Pointers -- 5.1 Introduction -- 5.1.1 The '&' Operator -- 5.1.2 The '*' Operator -- 5.2 Pointer Variables -- 5.2.1 Dangling Pointers -- 5.3 Pointers and Arrays -- 5.4 Array of Pointers -- 5.5 Pointers and Structures -- 5.6 Dynamic Allocation -- 5.6.1 Self Referential Structures -- Chapter 6 : Linked Lists -- 6.1 Introduction -- 6.2 Linked Lists -- 6.3 Operations on Linked Lists -- 6.3.1 Creation of a Linked List -- 6.3.2 Travelling a Linked List -- 6.3.3 Searching a Linked List -- 6.3.4 Insertion in a Linked List -- 6.3.5 Deleting a Node from a Linked List…”
    Libro electrónico
  9. 642029
    Publicado 2001
    “…More exceptional C…”
    Libro electrónico
  10. 642030
    por Hoffmann, Nicolas, 1983-
    Publicado 2013
    Tabla de Contenidos:
    Libro electrónico
  11. 642031
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- Acknowledgments -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Nmap Fundamentals -- Introduction -- Building Nmap's source code -- Getting ready -- How to do it... -- How it works... -- There's more... -- Experimental branches -- Updating your local working copy -- Customizing the building process -- Precompiled packages -- Finding live hosts in your network -- How to do it... -- How it works... -- There's more... -- Tracing routes -- Running the Nmap Scripting Engine during host discovery -- Exploring more ping scanning techniques -- Listing open ports on a target host -- How to do it... -- How it works... -- There's more... -- Privileged versus unprivileged -- Scanning specific port ranges -- Selecting a network interface -- More port scanning techniques -- Fingerprinting OS and services running on a target host -- How to do it... -- How it works... -- There's more... -- Increasing version detection intensity -- Aggressive detection mode -- Configuring OS detection -- OS detection in verbose mode -- Submitting new OS and service fingerprints -- Using NSE scripts against a target host -- How to do it... -- How it works... -- There's more... -- NSE script arguments -- Script selection -- Debugging NSE scripts -- Adding new scripts -- Reading targets from a file -- How to do it... -- How it works... -- There's more... -- Excluding a host list from your scans -- Scanning an IP address ranges -- How to do it... -- How it works... -- There's more... -- CIDR notation -- Scanning random targets on the Internet -- How to do it... -- How it works... -- There's more... -- Legal issues with port scanning -- Collecting signatures of web servers -- How to do it... -- How it works... -- There's more…”
    Libro electrónico
  12. 642032
    Publicado 2019
    Tabla de Contenidos: “…. -- How it works... -- See also -- C++ in R via the Rcpp package -- Getting ready -- How to do it... -- How it works... -- See also -- Interactive plots with the ggplot GUI package -- Getting ready -- How to do it... -- How it works... -- There's more... -- Animations with the gganimate package -- Getting ready -- How to do it... -- How it works... -- See also -- Using R6 classes -- Getting ready -- How to do it... -- How it works... -- There's more... -- Modeling sequences with the TraMineR package -- Getting ready -- How to do it... -- How it works... -- There's more... -- Clustering sequences with the TraMineR package -- Getting ready -- How to do it…”
    Libro electrónico
  13. 642033
    Publicado 2018
    Tabla de Contenidos: “…Adding containers to automatic storage tablespaces -- Tablespace rebalance operation -- Reclaimable storage -- Converting DMS tablespaces to use automatic storage -- Smart disk storage management -- Creating a table -- Alter table -- Expression-based indexes -- Invalidation of database objects -- Revalidation of database objects -- Online table move -- Tracking the execution of online table move -- Online table move planning -- Online table move-running changes -- Copy schema procedure -- Range clustering and range partitioning tables -- Range clustered tables -- Range clustered table planning -- Range partitioned tables -- Listing the data partitions -- Detaching a data partition -- Attaching a data partition -- MDC -- MQT -- ITC -- Db2 BLU Acceleration -- Implementing BLU -- BLU compression and statistics -- BLU disk space management -- BLU platform management -- Anatomy of a columnar table -- Db2 V11.1 BLU advances -- db2convert -- Db2 pureScale -- Members -- Cluster-caching facility (CF) -- Shared disk storage -- Cluster services and interconnect -- Db2 v11.1 pureScale advances -- Availability -- Installation and upgrades -- Management and performance -- Features -- Self-tuning database memory manager (STMM) in pureScale -- Self-tuning CF memory in pureScale -- Db2_DATABASE_CF_MEMORY (DB2 registry variable) -- CF_DB_MEM_SZ (DB CFG in 4K pages) -- CF_GBP_SZ, CF_LOCK_SZ, CF_SCA_SZ (DB CFG in 4K pages) -- Data compression -- Static row compression -- Should the table be compressed? …”
    Libro electrónico
  14. 642034
  15. 642035
    por Baronio, Cesare, 1538-1607
    Publicado 1588
    991006684119706719
  16. 642036
    Tabla de Contenidos: “…Conté: Tomus primus complectens historiae ecclesiasticae Veteris Testamenti volumen primum; Tomus secundus. …”
    Libro
  17. 642037
  18. 642038
    Publicado 1792
    Accés lliure (ARCA)
    Accés lliure (Hemeroteca digital AHCB)
    Accés lliure (Hemeroteca digital BNE)
    Accés lliure
    991005180149706719
  19. 642039
    Publicado 2017
    Tabla de Contenidos: “…Chat (Zopim) channel -- Talk channel -- Web Widget channel -- Mobile SDK channel -- API channel -- Setting up Zendesk channels -- Email channel setup -- Adding internal e-mail addresses -- Forwarding example with Outlook.com -- Create SPF record -- Email channel settings -- Accept wildcard emails -- Personalized email replies -- Gmail Go-to Actions -- Email templates -- Mail delimiter -- Custom domain for DKIM -- Facebook channel setup -- Adding your first Facebook page -- Facebook channel settings -- Twitter channel setup -- Adding your first Twitter account -- Twitter channel settings -- Account-related settings -- General settings -- Manage searches -- Widget channel setup -- About Zendesk's widget -- Widget customization -- Widget snippet code -- Help Centre (Support Form) channel setup -- Zendesk's Help Centre- A quick overview -- The support form -- Summary -- Chapter 5: Customizing Business Rules and Ticket Escalation -- What are Business Rules? …”
    Libro electrónico
  20. 642040
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: AWS Fundamentals -- Introduction -- Creating an account -- Regions and Availability Zones -- The AWS web console -- CloudFormation templates -- Infrastructure as Code -- Visibility -- Consistency -- Troubleshooting -- Scale -- Costs -- DevOps -- Server configuration -- IaC on AWS -- CloudFormation -- What is CloudFormation? …”
    Libro electrónico